Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Cato CTRL Threat Research: Uncovering Nytheon AI - A New Platform of Uncensored LLMs

With the introduction of WormGPT in 2023, threat actors have been using uncensored large language models (LLMs) for malicious activities. Following the shutdown of WormGPT in the same year, numerous alternatives have emerged—including BlackHatGPT, FraudGPT, and GhostGPT, among others—primarily accessible through Telegram channels.

Fortune Media and Great Place To Work Name Forward Networks to 2025 Fortune Best Workplaces in the Bay Area

Great Place To Work® and Fortune magazine have honored Forward Networks as one of this year's Best Workplaces in the Bay Area. This marks back-to-back years of Forward Networks being named to this prestigious list, coming in at No. 16 in 2025. Earning a spot means that Forward Networks has surpassed rigorous benchmarks, establishing itself as one of the best workplaces in the San Francisco Bay region.

Meet Cato's MCP Server: A Smarter Way to Integrate AI Into Your IT & Security Processes

Sometimes preparing dinner can be a complicated task. You’re juggling a stir-fry, boiling pasta, prepping a salad, and all you want is to say “Chop the onions” and have it done. No switching between tasks, no looking up steps. Just state the intent, and it’s executed. We wanted that same level of simplicity when interacting with our environment, including sites, users, topology, and real-time data. That led us to build Cato’s Model Context Protocol (MCP) Server.

Is Your Rented Server Safe Enough?

We get it-you've rented a server. Whether it's for your business, your app, your game, or just that brilliant startup idea you're nurturing, renting a server feels like leveling up. It's exciting, empowering... and terrifying. Because the moment that server is online, it's visible to the entire internet. Including the bad guys. Hackers, bots, DDoS armies, and other digital troublemakers don't care that it's "just a test project." If it's online, it's fair game. So, how do you protect it?
Featured Post

Navigating Operational Resilience Regulation in Cloud Computing

The rate of adoption for cloud computing has grown steadily across many industries, driven by the need for flexibility, innovation and cost efficiency. One of the key verticals that has fully embraced cloud technology is the financial services sector. Cloud is particularly suited to this industry as it allows for more efficient storage, faster processing of large amounts of data, and consolidation of records which gives firms the ability to accurately analyse data.

Protect AI-power apps with Cloudflare Firewall for AI

As organizations refactor applications and adopt AI and Large Language Models (LLMs) to power new applications and enhance existing services, a new class of security vulnerabilities has emerged. Traditional web application firewalls (WAFs) are only partially equipped to defend against threats unique to AI. In this video, we provide an overview of Cloudflare's Firewall for AI product, how it works, and how you can use it to protect AI models and safeguard user interactions with those models.

Why Architecture Still Wins: Making SASE & SD-WAN Work Without Compromise

The shift to cloud, SaaS, and hybrid work is no longer breaking news. What is surprising is how many IT and network teams are still trying to stitch together architectures that weren’t designed for today’s distributed world. Data is everywhere. Users are everywhere. Applications live across SaaS, public cloud, and private data centers. Yet too often, traditional network and security architectures can’t keep up, creating bottlenecks, security gaps, and user frustration.

How Corelight Deployed Zeek at 20 Sites in 4 Months After 7-Year Stalemate

Corelight CEO Brian Dye shares the story of the company’s first multi-million-dollar customer—a team that had spent seven years trying to operationalize Zeek using another commercial vendor. With Corelight, they were up and running across 20 sites in just four months. This story highlights the foundational value Corelight provides: a hardened, scalable Zeek deployment that unlocks visibility, incident response, and threat hunting at scale.